- Backup Basics Part 1: Demystifying Server and Workstation Backup Methods
- Jun 16, 2006
- Understanding the options for backing up servers and workstations is important for any technician or system/server administrator. But for new IT staff, all the details about how backups work and how to configure them can be confusing. In this first article in a three-part series, Ryan Faas demystifies the various types of backups that can be performed on servers and workstations using most backup applications.
- Backup Basics Part 2: Demystifying Backup Media
- Jun 30, 2006
- In part two of a three-part series on backup basics, Ryan Faas continues to demystify backup options for new technicians and server/systems administrators. This time, the topic is choosing the media in which to store your backups. Find out the pros and cons of tape, hard drives, and RAID arrays; using network storage; and archiving using CDs or DVDs.
- Backup Basics Part 3: General Tips for a Backup Strategy
- Jul 14, 2006
- Knowing how to configure backup applications and select backup media is half the battle of designing a successful backup strategy. The other half is choosing how and when to back up the specific pieces of data that are stored on your servers, share points, and workstations. In this final article of his series on backup basics for new technicians and administrators, Ryan Faas offers some suggestions to help you make these important decisions.
- Basic Access List Configuration for Cisco Devices
- Apr 4, 2011
- This article discusses the basic concepts of how ACLs work and shows how a basic ACL is configured.
- Basic Cisco IOS Software and Catalyst 3550 Series Security
Dmitry Bokotey, Andrew Mason, Raymond Morrow
- Jul 25, 2003
- Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
- Basic Data Transmission in Networks: MAC Tables and ARP Tables
- May 12, 2015
- Bombarded with jargon, no wonder networking beginners get lost. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, explains some crucial terminology for anyone who needs to understand complex networking.
- Basic Intrusion Prevention System (IPS) Concepts and Configuration
- Jun 29, 2011
- This article looks at the current IOS device based network intrusion prevention system (NIPS).
- Basic IP Connectivity and Troubleshooting in Cisco Express Forwarding
Nakia Stringfield, J. Kronik, Stacia McKee
- Oct 26, 2007
- Basic IPsec VPN Topologies and Configurations
James Henry Carmouche
- Sep 29, 2006
- In this chapter, you will review several common deployments of IPsec virtual private networks (VPNs).
- Basic Layer 3 Routing Concepts
- Oct 6, 2015
- How does a message get from point A to point B on a network? Though the question may seem simple, the process isn't. Sean Wilkins, co-author of CCNA Routing and Switching 200-120 Network Simulator, discusses how basic packet routing works.
- Basic NAT Concepts and Configuration
- Jul 6, 2011
- This article looks at some of the basic concepts that are used when configuring NAT and reviews the configuration steps required to get NAT working.
- Best Practices for Deploying Secure Cisco IP Telephony Solutions
- Oct 31, 2012
- A brief discussion of why it's important to secure IP Telephony Networks, how to go about it, and the actual deployment thereof.
- BGP Fundamentals
Vinit Jain, Brad Edgeworth
- Jan 1, 2018
In This sample chapter from Troubleshooting BGP: A Practical Guide to Understanding and Troubleshooting BGP, the authors cover BGP Messages and Inter-Router Communication, Basic BGP Configuration for IOS, IOS XR, and NX-OS, IBGP Rules, EBGP Rules, and BGP Route Aggregation
- Big Data Analytics and NetFlow
- Oct 19, 2015
- This chapter from Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security covers an introduction to big data analytics for cyber security, NetFlow and other telemetry sources for big data analytics for cyber security, Open Security Operations Center (OpenSOC), and understanding big data scalability.
- Book Review: "Deploying Wireless WANs" and Interview with Jack Unger
- Mar 14, 2003
- Border Gateway Protocol, Route Manipulation, and IP Multicast
Anthony Bruno, Steve Jordan
- Oct 26, 2007
- Branch Connections
Cisco Networking Academy
- Nov 30, 2017
Broadband solutions provide teleworkers with high-speed connection options to business locations and to the Internet. In this sample chapter from Connecting Networks v6 Companion Guide, identify branch connection options for small to medium-sized businesses, basic configuration for a PPPoE connection on a client router, and more.
- Broadband Routers and Firewalls
Ido Dubrawsky, Wes Noonan
- Nov 17, 2006
- Building a Business Case for VoIP
John Q. Walker, Jeffrey T. Hicks
- Feb 23, 2004
- This chapter explains how to build a business case for VoIP. It points out some
of the benefits that VoIP can provide and discusses how to analyze return on
investment (ROI) for VoIP implementation and management.
- Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
- Oct 27, 2006
- Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.